Skip to content

Commit 4cd4d82

Browse files
committed
refactor(API8:2019): remove attack scenario #1
This was the only top 10 weakness with more than two attack scenarios. To keep all top 10 weaknesses single sheet, the least relevant attack scenario was removed.
1 parent 99ef373 commit 4cd4d82

File tree

3 files changed

+1
-22
lines changed

3 files changed

+1
-22
lines changed
-182 Bytes
Binary file not shown.
-962 Bytes
Binary file not shown.

2019/en/src/0xa8-injection.md

Lines changed: 1 addition & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -21,27 +21,6 @@ The API is vulnerable to injection flaws if:
2121

2222
### Scenario #1
2323

24-
Inspecting the web browser network traffic, an attacker identifies the following
25-
API request responsible to start the recovery password workflow:
26-
27-
```
28-
POST /api/accounts/recovery
29-
{"username": "[email protected]"}
30-
```
31-
32-
The attacker replays the request with a different payload
33-
34-
```
35-
POST /api/account/recovery
36-
{"username": "[email protected]';WAITFOR DELAY '0:0:5'--"}
37-
```
38-
39-
This time, the response took ~5 seconds confirming the API is vulnerable to SQL
40-
injection. Exploiting this vulnerability, the attacker was able to gain
41-
unauthorized access to the system.
42-
43-
### Scenario #2
44-
4524
Firmware of a parental control device provides the endpoint
4625
`/api/CONFIG/restore` which expects an appId to be sent as a multipart
4726
parameter. Using a decompiler, an attacker finds out that the appId is passed
@@ -60,7 +39,7 @@ vulnerable firmware:
6039
$ curl -k "https://${deviceIP}:4567/api/CONFIG/restore" -F 'appid=$(/etc/pod/power_down.sh)'
6140
```
6241
63-
### Scenario #3
42+
### Scenario #2
6443
6544
We have an application with basic CRUD functionality for operations with
6645
bookings. An attacker managed to identify that NoSQL injection might be possible

0 commit comments

Comments
 (0)